Results 1 - 10 of 96
Results 1 - 10 of 96. Search took: 0.017 seconds
|Sort by: date | relevance|
[en] Nowadays there is a gap due to the absence of an updated and formalized methodology that can be used to assess security levels in WSNs (Wireless Sensor Network) under IoT (Internet of Things) devices in nuclear environments (which are considered hostile environments and require a higher level of security). This gap causes information security professionals to have difficulties in making a broad assessment of the vulnerabilities in their WSNs, with greater concern when coupled with IoT devices. This work aims to present a methodology to evaluate the reliability of the use of levels security with IoT devices for nuclear installations using WSNs. The proposal of the methodology consists of 5 main stages and 21 substage, which are part of the category of a function in groups of cyber security results that are linked to programmatic needs and specific activities of mandatory execution. Understanding so that the security of a WSN considering the current IoT context for nuclear installations is necessary, where important characteristics in these critical environments should be explored (e g., the presence of radioactivity, in addition to the decontamination of materials and equipment, determine access to authorized persons). The application of the defense-in-depth concept of anomaly solution management and prevention against atypical events to provide an effective safety mechanism, ensuring its safe use in these high criticality environments. (author)
[en] Occupy the centre – Case Study: Shop boycotts: • A rural town has put itself forward for a consultation process for a new government facility. • Some town members are motivated supporters. Some are motivated opponents. • Motivated opponents are boycotting the businesses of known supporters. It’s happening but it’s not openly declared and documented. • First stop: Why are they doing that? • Motivated supporters are getting agitated by this. They want to attack this behavior. • Second stop: What should they do? • Motivated supporters do nothing. • Motivated opponents brag on social media that a business will close down and they helped bring that about. • Third stop: Why did they do that? • Fourth stop: Is it time to act now? • Motivated supporters act on this, and do so from the centre.
[en] How can we encourage civilized discussions? • Build new products to curb the spread of misinformation and fake news; • Moderate online discussions with house rules; • Empower people with the necessary tools to make informed decisions when they encounter potential misinformation and fake news
[en] Quantum entanglement is a crucial element of establishing the entangled network structure of the quantum Internet. Here we define a method to achieve controlled entanglement access in the quantum Internet. The proposed model defines different levels of entanglement accessibility for the users of the quantum network. The path cost is determined by an integrated criterion on the entanglement fidelities between the quantum nodes and the probabilities of entangled connections of an entangled path. We reveal the connection between the number of available entangled paths and the accessible fidelity of entanglement and reliability in the end nodes. The scheme provides an efficient model for entanglement access control in the experimental quantum Internet.
[en] Pre-Launch - Develop Your Strategy: Educate, engage, and entertain a broad audience (Facebook - 1-3 posts/day); Inform and educate students and professionals (Instagram - 1 post/M-F); Inform news outlets, educate and engage general public (Twitter - 3-5 posts/day)
[en] IoT (Internet of Things) technically connects billions of entities to the Internet. The IoT is divided between the technology and the service itself. As a result, great efforts are needed to join data from many contexts and services. This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobility, security, reliability and scalability of IoT. These billions of devices are interconnected to each other either using unicast, multicast or broadcast communications, and mixture of static and mobile communications. This paper aims to investigate the parameters of mobility performance in handover process for mobile multicast IoT environment. Investigation is done quantitatively by evaluating the parameters of handover process for IoT in two networking protocols that are possible to support acceptable mobility performance for IoT. The protocols are ICN (Information Centric Networking) and Proxy Mobile Internet Protocol. The evaluation parameters include packet loss and service recovery time. The metrics are extracted from the handover process flow for each network protocol topology. The service recovery time parameter is assumed as the time duration for each message to travel from sender to receiver, while packet loss parameter depends on the packet arrival rate and service recovery time. The results show that the ICN performs better than Proxy Mobile Internet Protocol. (author)
[en] Summary: Widening Audiences: Every year the age spread of users increases. Usability improvements make social media more inclusive. Video and voice will bring in the very old, very young and less literate. Your reach is getting deeper and broader. There will be more need for targeting. Recommend: It's less and less appropriate to post the same things on every channel. Think about focusing platform content more to user personas. It might be worth making small experiments with paid targeting
[en] Need is to Provide Accurate and Truthful Information: • Medium of outreach can be to any media; • Traditional media well understood reaction time more; • Social Media is chaotic and reaction time very small; • Players are too many and asymmetric